{"title":"(How) Can We Manage the Trustworthiness of Security Infrastructures and Services?","authors":"Shouhuai Xu","doi":"10.1109/APTC.2008.11","DOIUrl":null,"url":null,"abstract":"The Internet has become a vital communication infrastructure. However, the same Internet has also become the vehicle for many powerful malicious attacks (e.g., botnets) that could turn it into doing more harm than good. This has led to the development, and sometimes deployment, of various security infrastructures and services (e.g., PKI, DNSSEC and TPM). Unfortunately, it seems inevitable, at least for the many years to come, that malicious attacks would remain successfully. Therefore, it has become increasingly more important to be able to understand, model, and ultimately manage the trustworthiness of security infrastructures and services. In this talk the speaker will expose his view towards solving this challenging and important problem. Some initial results and open problems will be discussed as well.","PeriodicalId":159186,"journal":{"name":"2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference","volume":" 46","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/APTC.2008.11","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
The Internet has become a vital communication infrastructure. However, the same Internet has also become the vehicle for many powerful malicious attacks (e.g., botnets) that could turn it into doing more harm than good. This has led to the development, and sometimes deployment, of various security infrastructures and services (e.g., PKI, DNSSEC and TPM). Unfortunately, it seems inevitable, at least for the many years to come, that malicious attacks would remain successfully. Therefore, it has become increasingly more important to be able to understand, model, and ultimately manage the trustworthiness of security infrastructures and services. In this talk the speaker will expose his view towards solving this challenging and important problem. Some initial results and open problems will be discussed as well.